General

  • Target

    5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

  • Size

    104KB

  • MD5

    5003a3a2bea2de1b60c021ecde3601da

  • SHA1

    95bd62acbb1f484d1c5d9b805688247b11b0b01c

  • SHA256

    5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9

  • SHA512

    cd93653a06f6adb2b34650ee6f220304b6e62847ff78bd6140e9e1641d0888d2dd7e1eefe9d76750e77922348f3a5aa7aab8ce96bc40d59376e864747db9cced

  • SSDEEP

    1536:czvQSZpGS4/31A6mQgL2eYCGDwRcMkVQd8YhY0/EqQIzmd:nSHIG6mQwGmfOQd8YhY0/E1UG

Score
10/10

Malware Config

Extracted

Family

lokibot

C2

http://shopper.bulutlogistic.com/fre.php

http://kbfvzoboss.bid/alien/fre.php

http://alphastand.trade/alien/fre.php

http://alphastand.win/alien/fre.php

http://alphastand.top/alien/fre.php

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 1 IoCs
  • Lokibot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5f9d26f02be7d03a6f8acaccc498eca1c0b66f56c3dbf6634aaa9a52dc387da9
    .exe windows:5 windows x86 arch:x86

    0239fd611af3d0e9b0c46c5837c80e09


    Headers

    Imports

    Sections